|Publication number||US5715387 A|
|Application number||US 08/742,632|
|Publication date||3 Feb 1998|
|Filing date||1 Nov 1996|
|Priority date||10 Feb 1995|
|Also published as||US5600790|
|Publication number||08742632, 742632, US 5715387 A, US 5715387A, US-A-5715387, US5715387 A, US5715387A|
|Inventors||Michael A. Barnstijn, Mark E. Church, Barry W. Linkert, Mihal Lazaridis|
|Original Assignee||Research In Motion Limited|
|Export Citation||BiBTeX, EndNote, RefMan|
|Patent Citations (12), Referenced by (132), Classifications (9), Legal Events (4)|
|External Links: USPTO, USPTO Assignment, Espacenet|
This is a continuation of application Ser. No. 08/386,528 filed Feb. 10, 1995, now U.S. Pat. No. 5,600,790.
The present invention is a system and method for verifying the correct operation of computer application programs. The invention is associated generally with the fields of application debugging or program debugging, but is particularly relevant to the development, optimization and debugging of special purpose or embedded microprocessor systems.
The present invention relates to a method and system for confirming the correct operation of a computer program that is to be executed on a computer system (the "target system" or "remote system") that is different than the computer system on which the application code is being developed (the "host system" or "development system").
Several well-known methods for developing and verifying the correct operation of target system programs currently exist. One popular method is to create a software simulation of the target system to simulate the input/output (I/O) process through use of computer graphics, printed output, or other means. This method has two primary disadvantages: 1) the simulation of the target system may have inherent errors or inaccuracies and thus may not properly indicate the behavior of the target system and 2) the simulation program requires significant programming effort to generate and validate. Additionally, such simulation programs are generally cumbersome, are frequently application-dependent and usually require a significant amount of storage.
Another popular method of developing target system applications is though use of a processor or Central Processing Unit Emulator ("CPU Emulator"). This method requires that the CPU for the target system be replaced during the development phase with a device that emulates the functions of the CPU. Although such a system may provide an application program developer with the ability to examine the internal status of the CPU and to control extensively the operations of the CPU, such emulation systems are physically large, expensive and often require special or application-specific hardware and software. Frequently, special adapters and wiring harnesses are also required to attach the emulators to the target systems.
A further well-known method of debugging target system applications is by the use of software debuggers such as Microsoft's CodeView® and Borland's Turbo Debugger® in the IBM PC® compatible development environments. When the application is being designed to run on an IBM PC, these debugging programs enable the developer to control the execution of the program and provide information to the developer about internal program states. This debugging method requires that the target system be IBM PC compatible, DOS operating system compatible and that the target system include compatible video display, keyboard, and disk system hardware and software. For many target system applications, the need to provide extra hardware and software for merely debugging purposes renders such an approach economically infeasible.
In many prior art development environments, the application program is down-loaded to and stored on the target system after it is determined through one of the above prior art methods that the application program is functioning at some acceptable level of accuracy or efficiency. When the application program is to be down-loaded, the program instructions are typically generated using prior art methods by a compiler or assembler with relative address references for both code and data. In most prior art systems, the problem of locating the instructions on the target system is resolved through use of a table of values to "fix up" or convert the address references to references required by the target system. Such a "relocation table" is generated in compilers and assemblers in conjunction with the generation of executable instructions. This approach, however, requires that all addresses or locations be resolved to a specific location before the program can be run.
In prior art systems, addresses are, more specifically, resolved in one of two primary ways:
1) by having the target system compute the next available address and perform address resolution before the program is run, or
2) by providing specific memory resolution information for the target system before loading the application into the target system.
The first method is widely used in many popular computing environments such as the IBM PC but has the drawback of requiring that the target system have the relocation table in memory to perform the required address resolution.
The second approach is typically used in relocating an application designed for small operating systems. Under this second method, relocation decisions are made manually at program build time, and the relocation is performed with the presumption that the program my occupy a fixed address in the target system without conflict. This method is adequate for single application environments, but when the method is extended to target systems capable of running multiple applications, difficulties arise. If one or more applications are loaded onto the target system, the relocation must be performed manually before each program load to avoid overwriting the data or code space of the other applications. Therefore, this method is cumbersome, error prone, and inappropriate for loading applications designed to operate on target systems in the field.
In view of the deficiencies in current embedded systems development and debugging strategies, the current invention provides a method and system whereby a program intended for a target system can be developed and tested directly on the host system. This approach provides a developer using the invention to observe the operation of the program in the target system as the program is being developed. The method and system are particularly useful in developing applications for target systems that incorporate very austere I/0 capabilities.
As will be discussed in greater detail below, a host system is connected to the target system in the preferred embodiment via a communications link. A program is loaded onto the host computer that translates operating system calls into a number of communication signals that are transmitted over this communications link. A communication program that is compatible with a communications program residing on the host system is loaded onto the target system. Such a program translates the communication signals into operating system calls in the target system. The operating system calls are interpreted by the operating system and the output hardware of the target system is manipulated in response to the operating system calls.
In a similar way, input from the target input hardware is processed in the preferred embodiment. An input to the target system, such as through the use of a keypad on the target system hardware, causes the operating system on the target system to be informed of an event. The target operating system in turn sends an operating system signal to a debugging application in the target system. The debugging application in the target system then sends an operating system signal to the operating system.
The operating system translates the operating system signal to an event signal for communication over the communications link and sends the event signal over the communications link. The host system receives the event signal from the communications link and processes the event signal using a communication program resident on the host system, thereby translating the event signal into a host system operating system signal. This operating system signal is transferred to the application under development in the host system.
In this manner both input and output events are physically executed or initiated using the target system's hardware while one or more applications under development reside and are executed in the host computer development environment. Such a method and system present the additional advantage that the application developer can use the host system to engage more sophisticated diagnostic tools to aid in the application program development.
As with many prior art development environments, after the correct operation of the program is determined by the present invention, the application program is down-loaded to and stored on the target system. To accomplish this, the invention employs a method not known in the art to address the difficulties created by program instructions generated by a compiler or an assembler associated with relative address references for code and data. The current invention improves upon and eliminates many of the shortcomings found in the prior art by providing a novel method for resolving the addresses in a target application. The instant invention provides a special application loader program that communicates with the operating system of the target device and interrogates the status of the target systems code and data memory. The application loader decides, based on the size of the application to be loaded, where the application may be stored in the target memory space. If insufficient space is available on the target system, then in the preferred embodiment of the instant invention, an error message is displayed and the download process is aborted. Otherwise, the download program proceeds to operate on the application program to resolve its addresses.
In addition to the advantages immediately apparent in the design of the instant invention, further advantages that might not be as apparent also flow from the method and system described in greater detail below. One additional advantage is that the development environment allows the application developer to generate, test and debug an application program that is too large for the specific memory capacity of the embedded system that is, or that comprises a part of, the target system so that the developer is not bound during application development by the physical constraints of the target system's memory. This feature is especially important if the memory limitations of the target system can be addressed by subsequently compacting the developed application code or if the field version of the target system upon which the application is to be implemented will have greater memory capacity that the target system used for testing and development.
Additionally, this feature permits the development of applications that are meant for implementation on an extended operational system that implements I/O without an embedded system or special purpose system or in which an embedded system comprises only a subsystem of the operational system or acts only as a peripheral device, thereby allowing the testing of the input/output features of the overall operational system without necessarily testing the entire operational system.
FIG. 1 shows the physical appearance of the preferred embodiment of the target system of the current invention.
FIG. 2 shows the Operating System Modules and Interconnections for the preferred embodiment of the current invention.
FIG. 3 illustrates the Operating System Modules and Interconnections.
FIG. 4 illustrates the connection of Host System 401 to Target System 403 for purposes, in the preferred embodiment, of loading an application or for verifying the correct operation of such application.
FIG. 5 shows the Logical Debugging Interconnections, or the logic and control flow between the modular elements in the preferred embodiment.
FIG. 6 illustrates a typical, detailed sequence of events between the Target System and the Host System.
FIG. 7 illustrates the decision flow in the Host System Debugging TSR.
FIG. 8 illustrates the decision flow in the Target System Debugging Application.
FIG. 9 illustrates the process flow loading an Application into the Target System.
The preferred embodiment for the current invention is a development system for a mobile terminal marketed under the tradename MPT. The MPT is a hand held wireless terminal product of Research In Motion Limited, of Waterloo, Ontario, Canada that is designed to have hardware and operating system support for a wide variety of application programs. The hardware and operating system support are specialized for, but not limited to, financial transaction environments and may also include a number of other capabilities including two way paging and point-to-point or broadcast messaging.
FIG. 1 illustrates the MPT, which is one example of a terminal that can be used with the current invention as the hardware platform for the target system. Illustrated in FIG. 1 is MPT's LCD display 101, used for displaying information to the user of the terminal, folding antenna 102 used as the antenna to contact the RF network, soft function keys 103 for application and context specific functions, function keys 104 for additional application functions, alpha-numeric telephone-style keyboard 105 for user data entry, and magnetic card reader slot 106 for reading cards with a magnetic stripe, such as credit cards.
FIG. 2 is the block diagram of the major hardware subsystems of the MPT. As shown in FIG. 2, designated as 201 is a Central Processing Unit ("CPU") that, in conjunction with its operating system software, is capable of executing one or more application programs contained in Program Storage 202, using data stored in Data Storage 203 and performing specific actions on at least one of peripherals 204-211.
Power management 204 is preferably a timer that causes liquid crystal display 210 to be powered-down and CPU 201 to operate at a slower speed. The MPT remains in this power saving state until a key on keypad 211 is pressed.
Debug serial port 205 provides the link to the host system through which the host system sends commands to the debug application on the MPT and through which the debug application sends hardware events to the host system.
Tone generator 206 is a standard piezoelectric device, such as a crystal, whose frequency is controlled by CPU 201.
An external network can be connected through the RS-485 DIN Local Area Network Connection 207.
The information stored on the magnetic stripe of a credit card or other cards with such a magnetic stripe can be read by magnetic card reader 208 and sent to CPU 201 to be processed by the software.
CPU 201 can issue commands to an external printer or similar device via printer port 209 as may be required by a particular application.
Liquid crystal display 210 ("LCD") is the primary device for displaying information to the operator of the MPT. LCD 210 is controlled by CPU 201 through its operating system as may be required by a particular application to prompt the user to enter data, or to inform the user of certain events.
The user of the MPT is able to enter both text and numeric data manually using keypad 211 which generates events that are decoded by the MPT operating system software.
FIG. 3 illustrates the operating system architecture for the preferred embodiment of the invention. This diagram illustrates the principal hardware and software entities and their primary paths of interaction. User applications 301-303 communicate directly with the operating system through the BIOS (Built In Operating System) 308. The BIOS 308 is an interface specification that provides access to operating system services, such as displaying characters on LCD 316, or requesting data from a magnetic card swipe. There are three user applications shown in the FIG. 3, but one may appreciate any number of applications, up to an artificial or physical limit imposed by the operating system or the hardware may be implemented. In the preferred embodiment, all applications are stored in the program storage area. With more powerful multitasking and threading techniques readily available more than one application may be executing in the foreground at any point in time, in the preferred embodiment one application at a time runs in the foreground or is "in focus," i.e., it is the primary application to which I/O is directed. The practice of defining one application as the focused application in a multi-application environment is well known in the industry and is practiced by operating systems such as Microsoft Windows, a product of Microsoft Corporation of Redmond, Washington. In the preferred embodiment, the application that is in focus by default receives input from and delivers output to Devices 313-320. It should be noted that although items 313-320 are labelled Devices, included as items 317-319 are communication ports to which other devices may be, but need not necessarily be connected.
A request for output from an application is generated in the form of a call to the BIOS 308. The BIOS 308 in turn, interprets and translates this output request and calls the appropriate routine in I/O Processor 310. I/O Processor 310 performs the requested output on Devices 313-320.
Input from the user is realized as excitation of one of Devices 313-320 and causes notification of I/O Processor 310. I/O Processor 310 interprets and queues the input as an "event". Events are stored in Event Queue 305. The application that has the current focus is informed sequentially of the device excitation events in the order in which they occurred.
Timer 309 is a device that can be programmed by an operating system call to generate a Timer event after a known fixed time delay. This allows an application program to wait a certain amount of time for an event to happen and proceed if the time-out value is exceeded.
In addition to the regular input and output methods described above, there is a further mechanism to route specific I/O to a specific application. The operating system that comprises the preferred embodiment provides a BIOS function that allows an application to indicate that it requires to be informed of events from a specific device or devices, even when another application is in the foreground. The application events and the devices from which they originate that are "registered" are stored in Register Event Table 312. Events from the registered devices are first checked for inclusion in Register Event Table. If they are not registered by a specific application, the events are passed on to the application that has the current focus. In the preferred embodiment, registered events are stored in a separate event queue, Register Event Queue 306.
Scheduler and Application Table 307 is the process controller in the preferred embodiment of the operating system that comprises the invention. The Scheduler part of item 307 in turn manages each of the queue functions in the MPT O/S. Part of managing Event Queue 305 and Register Event Queue 306 involves sending messages to the appropriate application or applications.
Additionally, the preferred operating system includes Setup Program 304 that performs general user-initiated terminal management functions. Setup Program 304 permits the operator of the terminal to perform such functions as selecting which application should be the foreground application, suspending the operation of selected applications, or re-initializing applications to their starting conditions.
FIG. 4 illustrates the physical Debugging Interconnections between Host Computer (Host System) 401 and MPT Target (Target System) 403. The interconnection method used in the preferred embodiment is a bi-directional RS-232 serial connection. This type of connection is well known in the industry as a standard method of connecting data communicating devices together, although one of ordinary skill will appreciate that other types of communication connections will suffice as well. The interconnection cable 402 is a standard "null modem" connection. The specific construction of such a cable is well-known to those skilled in the art of computer communications. The nature of this specific communications channel is that signals comprising information may be transmitted in either direction over the link. The instant communications link allows for the simultaneous transfer of asynchronous bitwise information, although it should be appreciated that any communications channel, cable, system or network capable of transmitting information in two directions could be substituted for Communications Link 402.
FIG. 5 illustrates Logical Debugging Interconnections between the Host System 401 and Target System 403 or the connection and communication paths between the various software and hardware entities in the entire system. Application Program 502 under nest in the Debugging Environment 501 operates in Host System 509. A well-known method of debugging applications for the IBM PC as a target system is to run the Application Program under test inside a Debugging Environment 501 such as CodeView, a product of Microsoft Corporation of Redmond, Washington or Borland Turbo Debugger, a product of Borland International Inc. of Scotts Valley, Calif. These debugging environments permit a developer to inspect the application program, control its execution, halt execution of the program and examine the contents of program data storage areas. These tools have been available for several years and have matured to the point where they are both inexpensive and support many powerful debugging features. It should be noted that while the debugging environment provides an excellent and inexpensive mechanism for controlling and observing the application under development, there is no requirement that an application under test run under such a debugging environment. It is possible, and often desirable, to run an application under test directly from the operating system of the host system. When Application 502 is running in this manner, operating system calls for Target System 510 will be directed to such system through the INT call. All other operating system calls, in the preferred embodiment, will be directed towards Host System 509. It should be appreciated by one of ordinary skill in the art, however, that all the operating system calls not associated with a target system do not necessarily have to be directed to a host system, but could be advantageously directed to a number of other systems using the INT call or a similar function. The method and system of the preferred embodiment, however, permits the display and keyboard of Host System 509 to be used under Application Program control, in concert with the I/O of Target System 510, to control the operation of and annunciate the operating status of the Application Program that is being debugged or tested.
The Application Program under test is run in the preferred embodiment under the supervision of the Debugging Environment. When the Application Program needs to send output to Target System 510, a normal operating system level call is made. In Host System 509, a special Communications Program 503 is preloaded, in the instant case, as a TSR (Terminate and Stay Resident) program that accepts these operating system calls. In the preferred embodiment, the mechanism by which operating system calls are made is via the Intel x86 software INT mechanism, defined by Intel Corporation of Santa Clara, Calif. and well known in the software development community. The operating system calls from Application 502 are identical, whether the application is running on Host System 509 or is running on Target System 510. That is, both Target Operating System 506 and Communications Program 503 accept the same operating system calls through the same mechanism. The fact that both Target System 510 and Host System 509 microprocessors have identical software INT capabilities simplifies the design of Communications Program 503. As one of ordinary skill in the art of digital communications software will appreciate, if the operating system call mechanisms differed between Host System 509 and Target System 510, a simple additional translation in Communications Program 503 and/or Debug Application 507 would accommodate this difference.
Communications Program 503 generates signals from the above-mentioned operating system calls and relays these signals over Physical Communications Link 504. As stated above, the physical communications link is a bi-directional RS-232 serial communications link. The signals cross Communications Channel 511 and arrive at Physical Communications Link 505 in Target System 510. Target Operating System 506 receives these signals and relays the receipt of the messages contained in the signals to Debug Application 507. Debug Application 507 then interprets the messages and translates them into an operating system call equivalent to the operating system call that was originally made by Application 502. This operating system call then causes Target Input/Output 508 to be exercised accordingly. An example of a typical operating system call that operates in this manner in preferred implementation of the system and method in the MPT is the -- LCDputch call. The -- LCDputch call displays a given character on the LCD display of the MPT.
Similarly, for each excitation event generated physically on Target Input/Output 508, such as a keyboard keystroke or a magnetic card swipe, Target Input/Output 508 sends a signal to Target Operating System 506. This signal is then translated by Target Operating System 506 into an operating system signal. AS in normal operation, the application with the current focus (in this case the Debug Application 507) is sent an operating system message with the appropriate information. The Debug Application 507 translates the operating system message into a signal for transmission over Physical Communications Link 505. The signal is then transferred over Communications Channel 511 to Physical Communications Link on Host System 509. Communications Program 503 then interprets the signal, and performs a corresponding translation from communications signal to operating system signal. That operating system signal is then sent to the Application 502 as a message. An example of a typical operating system call that operates in this manner in the preferred operating environment of the MPT is the KEYPAD message ENTER-- KEY, which register the excitation of the enter key on the MPT key pad.
FIG. 6 illustrates a typical detailed sequence of events than occur when the current invention is operating and/or debugging an application program. The event sequence illustrated involves a hardware event on the MPT initiating a response in the application program, which causes a corresponding output to a hardware device on the MPT. A typical example of such a sequence occurs when a pressed key on the keyboard of the MPT (such as the "2" Key) would cause a "2" to appear in the next cursor position on the LCD display (101 or 210) of the MPT. This sequence would occur in many applications, for example in a point of sale application during entry of a transaction amount.
Target System MPT 601 is connected to Host System PC 602 via Asynchronous RS-232 Serial Link 603 in the same manner as described above. A hardware event causes Operating System 626 to send a message (Call Debug Application Function 604) to Debug Application 627 to execute a dispatch function. Debug Application 627 in turn translates this message into a debug event packet format and sends Debug Event Packet 606 via RS-232 Serial Link 603. In the preferred embodiment, Debug Event Packet 606 contains information concerning the type of event and may contain extra data, such as information obtained through the reading of a magnetic stripe in the case of a magnetic card read event. Debug TSR 608 on PC 602 receives Debug Event Packet 606, and if the packet is received without communication error a single byte ACK 607 is returned. ACK 607 is the indication to the MPT Debug Application that the Send Event 605 message has completed, allowing Debug Application 627 to continue its execution.
The receipt of Debug Event Packet 606 by Debug TSR 608 causes Dispatch Routine With Event 610 to be called. The information in Debug Event Packet 606 is transformed into the same message format as is used to communicate messages between MPT Operating System 626 and applications. Application 609, which receives the indication of this event in the preferred embodiment is in CV (CodeView). As stated earlier, Application 609 is written to respond to the receipt of this event by requesting an output on the MPT, in this case a character on the LCD screen.
To initiate this output, Application 609 calls MPT 0/S BIOS function 611. This BIOS function call is received by Debug TSR 608, which interprets the BIOS call, initiates Send Bios Request 612 and formats and sends corresponding Debug BIOS Packet 613. BIOS Packet 613 is sent over Asynchronous RS-232 Serial Link 603. In a manner similar to the ACK process from Debug TSR 608, Debug Application 627 sends ACK packet 614 to Debug TSR 608 to indicate successful reception of Debug BIOS Packet 613.
Upon receiving Debug BIOS Packet 613, Debug Application 627 decodes (at 615) Debug BIOS Packet 613 and calls a corresponding MPT O/S BIOS function in the MPT (at 616). MPT Operating System 626, at this point, actually performs the requested function and returns the status of that operation as Send BIOS Response 617. Send BIOS Response 617 is translated into Debug BIOS Packet Response 618 and transmitted over Asynchronous RS-232 Serial Link 603. Debug TSR 608 accepts Debug BIOS Packet Response 618, and indicates correct reception of this packet with a single byte ACK packet 619. Debug TSR 608 then translates Debug BIOS Packet Response 617 into a response to the original BIOS Request initiated by Application 609. Debug BIOS Packet Response 618 may be simply a BIOS function completion code or it may contain additional information.
At this point, Application 609 has completed the processing of the original system event. If Application 609 were running inside the MPT, this causes a return of processor control to the Target (MPT) Operating System 626. This return of control allows the processing of additional events. The return of control by Application 609 is indicated to Debug TSR 608 as a Return From Dispatch Function return 622 and translated into a single character (EOT) message 623 by Debug TSR 608. The EOT message is sent over Asynchronous RS-232 Serial Link 603 and interpreted as a Done Event message 624 by Debug Application 627. Debug Application 627 in turn returns control to MPT Operating System 626 via Return from Dispatch Function 625. To maintain synchronization in the data flow between MPT 601 and PC 608, an additional EOT 628 is provided from PC 602 back to MPT 601 in the preferred embodiment.
FIG. 7 illustrates the Host System process flow. This is the sequence of program steps that define the operation of the Debug TSR 608 shown in FIG. 6. The Debug TSR program begins at the Start 701 step, where it is initialized and begins program execution. The Debug TSR then loads itself as a TSR at step 702, and returns control of the host system to the operating system. The loading of an application program as a TSR is a well-known practice in PC-based software development. Loading an application as a TSR frees the host operating system to run the Debugging Environment and Application shown on FIG. 5 as items 501 and 502, respectively. The Debug TSR then enters state 703, where it waits for either a BIOS function call from Application 501 or a serial character input from the communications link. On receipt of a serial character, the Debug TSR enters the Accumulate Serial Characters State 704. The accumulated serial characters are then examined at step 706. If the accumulated serial characters do not constitute a full debug packet, the Debug TSR returns to state 703. If the accumulated serial characters do constitute a full debug packet, then the packet is examined for a correct Cyclic Redundancy Check (CRC) check sum at step 708. The use of a CRC is a common method of verifying the correct reception of a complete packet of information. It would be well known to one of ordinary skill in the area of error correction and control to extend the instant invention to incorporate more intricate system checksums, delimiting characters, or any combination of additional verification means. If the packet does not pass the verification test at step 708, the Debug TSR returns to state 703 (label A). If the debug packet passes the checksum test, the packet is translated into an appropriate BIOS event message at step 710, and an ACK is sent across the serial link to the Debug Application on the Target System at step 712. The Debug TSR then makes a call to the dispatcher function in the Application in the Host System at step 713. Alternatively, if while in state 703, the Debug TSR receives a BIOS call from the Application, the Debug TSR then proceeds at step 805 to build the Debug Packet from the data supplied with the BIOS call. In the preferred embodiment, this information is supplied through register contents, although it can be supplied through any direct or indirect data storage. The Debug Packet thus formed is transferred character by character through the Serial Link at step 707. After each character is sent, a test is performed at step 709 to determine if this is the final element of the packet. If the last character sent is not the last character in the packet, then the Debug TSR returns to state 707. If the last character sent is the last character in the packet, then the entire packet has been sent and the Debug TSR enters state 711. At step 711 the Debug TSR waits for an ACK from the Target System side of the communications channel. When this ACK is successfully received, the application returns to step 703 to wait for the next event. An alternative to the simple protocol implemented in the preferred embodiment includes a mechanism or process for resending Debug Packets or control signals such as ACKs if the items to be received are not successfully received within a time-out period.
FIG. 8 illustrates Target System process flow. This is the sequence of program steps that define the operation of Debug Application 627 shown in FIG. 6. The Debug Application program begins at the Start 801 step, where it is initialized and begins program execution. The Debug Application then loads itself as an Operating System Application at step 802 and returns control to the Target Operating System 506. The Debug Application then enters state 803, where it waits for either an event from the Target Operating System 506 or a serial character input from the communications link. On receipt of a serial character, the Debug Application enters the Accumulate Serial Characters state at step 804. The accumulated serial characters are then examined at step 806. If the accumulated serial characters do not constitute a full debug packet, the Debug Application returns to state 803. If the accumulated serial characters do constitute a full debug packet, then the packet is examined for a correct Cyclic Redundancy Check (CRC) check sum at step 808. As discussed above, the use of a CRC is a common method of verifying the correct reception of a complete packet of information, and the simple error correction and control that the CRC provides in the preferred embodiment could, with little additional effort, be extended to incorporate a more extensive correction scheme.
If the packet does not pass the verification test at step 808, the Debug Application returns to state 803 (label A). If the debug packet passes the checksum test, the packet is translated into an appropriate BIOS function call at step 810, and an ACK is sent across the serial link to the Host System Debug Application at step 812. The Debug Application then makes a call to the BIOS in the Host System at 813. Alternatively, if while in state 803, the Debug Application receives an event message from the Host System Operating System, the Debug Application then proceeds at step 805 to build the Debug Packet from the data supplied with the event message. In the preferred embodiment, this information is supplied through register contents, although can be supplied through any direct or indirect data storage. The Debug Packet formed at step 805 is transferred character by character through the Serial Link at step 807. After each character is sent, a test is performed at step 809 to determine if this is the final element of the packet. If the last character sent is not the last character in the packet, then the Debug Application returns to state 807. If the last character sent was the last character in the packet, the Debug Application enters state 811. In state 811 the Debug Application waits for an ACK from the Host System side of the communications channel. When this ACK is successfully received, the application returns to state 803 to wait for the next event. As above, an alternative to the simple protocol implemented in the preferred embodiment in the Target System Debugging Application Process includes a mechanism or process for resending Debug Packets or control signals such as ACKs if the items to be received are not successfully received within a time-out period.
FIG. 9 illustrates the Application Loading Process Flow. This is the sequence of events that occur when an application is to be stored in the application memory space in Target System. The result of the debugging or verification process is a relocatable program image. Relocatable programs have all of the internal address references unresolved, or relative to the location or locations that the application will ultimately be run from. The current embodiment uses the DOS "EXE" format as output from the standard DOS application development tools such as Microsoft C/C++, a product of Microsoft Corporation of Redmond, Washington or Borland C++, a product of Borland International Inc., of Scotts Valley, Calif.
In the preferred process, the Application Loader first interrogates the Target Operating System for the target system status via the Serial Link at step 902. The system status returned includes, but is not limited to, a) the starting address of free code storage, b) the starting address of free data storage, c) the quantity of remaining code storage, d) the quantity of remaining data storage, e) the size of total system code storage available if no other applications were in the system, and f) the size of total system data storage available if no other applications were in the system. At the next step 903, the Application Loader opens the file that contains the Application that is to be loaded onto the Target System. This file is analyzed and the code and data space requirements are computed. The results of this computation are compared to the reported Target System storage space availability at step 905. If the Target System does not have sufficient space to store the application, a further comparison is made at step 906 to determine if the application would fit if the other applications in Target System were removed. If there would not be sufficient space, the loading of this Application can not proceed, and the Application Loader is terminated with an appropriate warning message.
if the Target system would have sufficient storage space with the other applications removed, the operator of the Application Loader program is given the option to erase the other applications in Target System memory space at step 907. If the operator elects to not proceed, then the application terminates with appropriate annunciation. If either there is sufficient application space, or the operator elects to make sufficient application space by erasing other applications through Erase Applications step 907, the Application Loader calculates the pointer or memory reference offsets that would be required for the Application Program at the memory location offsets reported in step 902. The Application Loader then modifies the Application Offsets for the Application program at step 909, and transmits the Application to Target System at step 910. When the Target System acknowledges the successful reception and storage of the Application Program, the Application Loader terminates with a successful completion message.
|Cited Patent||Filing date||Publication date||Applicant||Title|
|US3815103 *||2 Jan 1973||4 Jun 1974||Honeywell Inf Systems||Memory presence checking apparatus|
|US4277827 *||2 Jan 1979||7 Jul 1981||Texas Instruments Incorporated||Microprocessor based system for the development and emulation of programmable calculator control read only memory software|
|US4729096 *||24 Oct 1984||1 Mar 1988||International Business Machines Corporation||Method and apparatus for generating a translator program for a compiler/interpreter and for testing the resulting translator program|
|US4730315 *||15 Oct 1985||8 Mar 1988||Hitachi, Ltd.||Diagrammatic method of testing program|
|US5046033 *||9 Aug 1989||3 Sep 1991||Unisys Corporation||System for transferring test program information|
|US5228039 *||9 May 1990||13 Jul 1993||Applied Microsystems Corporation||Source-level in-circuit software code debugging instrument|
|US5255385 *||20 Feb 1991||19 Oct 1993||Hitachi, Ltd.||Method of testing program, and compiler and program testing tool for the method|
|US5287512 *||6 Aug 1990||15 Feb 1994||Ncr Corporation||Computer memory system and method for cleaning data elements|
|US5293629 *||30 Nov 1990||8 Mar 1994||Abraxas Software, Inc.||Method of analyzing computer source code|
|US5363501 *||22 Dec 1992||8 Nov 1994||Sony Electronics, Inc.||Method for computer system development verification and testing using portable diagnostic/testing programs|
|US5371894 *||23 Dec 1993||6 Dec 1994||International Business Machines Corporation||Off-chip breakpoint system for a pipelined microprocessor|
|US5581695 *||7 Jul 1994||3 Dec 1996||Applied Microsystems Corporation||Source-level run-time software code debugging instrument|
|Citing Patent||Filing date||Publication date||Applicant||Title|
|US5812133 *||1 Nov 1995||22 Sep 1998||Allen Bradley Company, Llc||Industrial controller with display of rung execution|
|US5881289 *||26 Nov 1996||9 Mar 1999||Hewlett-Packard Company||Remote compiling of source code for cross development|
|US5953530 *||25 Nov 1997||14 Sep 1999||Sun Microsystems, Inc.||Method and apparatus for run-time memory access checking and memory leak detection of a multi-threaded program|
|US6002871 *||27 Oct 1997||14 Dec 1999||Unisys Corporation||Multi-user application program testing tool|
|US6110223 *||27 Oct 1997||29 Aug 2000||Altera Corporation||Graphic editor for block diagram level design of circuits|
|US6120550 *||27 Oct 1997||19 Sep 2000||Altera Corporation||Design file templates for implementation of logic designs|
|US6141635 *||12 Jun 1998||31 Oct 2000||Unisys Corporation||Method of diagnosing faults in an emulated computer system via a heterogeneous diagnostic program|
|US6161211 *||27 Oct 1997||12 Dec 2000||Altera Corporation||Method and apparatus for automated circuit design|
|US6205579 *||27 Oct 1997||20 Mar 2001||Altera Corporation||Method for providing remote software technical support|
|US6300787 *||1 May 2000||9 Oct 2001||Hewlett-Packard Company||System and method for observing information transmitted between two integrated circuits|
|US6311309||27 Oct 1997||30 Oct 2001||Altera Corporation||Methods and apparatus for simulating a portion of a circuit design|
|US6588004||7 Jul 2000||1 Jul 2003||Altera Corporation||Graphic editor for block diagram level design of circuits|
|US6665819 *||24 Apr 2000||16 Dec 2003||Microsoft Corporation||Data capture and analysis for embedded systems|
|US6701522||7 Apr 2000||2 Mar 2004||Danger, Inc.||Apparatus and method for portal device authentication|
|US6721804||15 Nov 2000||13 Apr 2004||Danger, Inc.||Portal system for converting requested data into a bytecode format based on portal device's graphical capabilities|
|US6725449 *||15 Aug 2000||20 Apr 2004||Advantest Corporation||Semiconductor test program debugging apparatus|
|US6735624||7 Apr 2000||11 May 2004||Danger, Inc.||Method for configuring and authenticating newly delivered portal device|
|US6738927||7 Feb 2001||18 May 2004||Stmicroelectronics Limited||Target debugging application on digital signal processor validating link connection to host computer|
|US6742038||7 Sep 2001||25 May 2004||Danger, Inc.||System and method of linking user identification to a subscriber identification module|
|US6754888 *||30 Dec 1999||22 Jun 2004||International Business Machines Corporation||Facility for evaluating a program for debugging upon detection of a debug trigger point|
|US6760904||2 Sep 1999||6 Jul 2004||Unisys Corporation||Apparatus and methods for translating test vectors|
|US6789211||7 Feb 2001||7 Sep 2004||Stmicroelectronics Limited||Storing in a reserved memory location data indicative of a stack location which stores the entry point of a dynamically loaded file|
|US6834357||7 Feb 2001||21 Dec 2004||Stmicroelectronics Limited||Establishing a pointer at a valid address location that is representative of a valid entry point of a communication routine|
|US6867763||11 Oct 2002||15 Mar 2005||Research In Motion Limited||Hand-held electronic device with a keyboard optimized for use with the thumbs|
|US6948095||7 Feb 2001||20 Sep 2005||Stmicroelectronics Limited||Methods and apparatus for dynamically loading a file on a target computer system|
|US6986125||23 Oct 2001||10 Jan 2006||International Business Machines Corporation||Method and apparatus for testing and evaluating a software component using an abstraction matrix|
|US7039831||7 Feb 2001||2 May 2006||Stmicroelectronics Limited||Common stack system for a debugging device and method|
|US7062512||27 Sep 2002||13 Jun 2006||Danger, Inc.||System and method for processing identification codes|
|US7064688||9 Jul 2001||20 Jun 2006||Good Technology, Inc.||System and method for compressing data on a bandwidth-limited network|
|US7069326||27 Sep 2002||27 Jun 2006||Danger, Inc.||System and method for efficiently managing data transports|
|US7107349||30 Sep 2002||12 Sep 2006||Danger, Inc.||System and method for disabling and providing a notification for a data processing device|
|US7117445||30 Jun 2003||3 Oct 2006||Danger, Inc.||Multi-mode communication apparatus and interface for contacting a user|
|US7136982||9 Nov 2001||14 Nov 2006||Danger, Inc.||Apparatus and method for allocating memory blocks|
|US7155483||7 Aug 2001||26 Dec 2006||Good Technology, Inc.||Apparatus and method for conserving bandwidth by batch processing data transactions|
|US7155725||27 Mar 2002||26 Dec 2006||Danger, Inc.||Apparatus and method for coordinating multiple e-mail accounts|
|US7162513||5 Sep 2002||9 Jan 2007||Danger, Inc.||Apparatus and method for distributing electronic messages to a wireless data processing device using a multi-tiered queuing architecture|
|US7178076||16 Jun 2004||13 Feb 2007||Sun Microsystems, Inc.||Architecture of an efficient at-speed programmable memory built-in self test|
|US7206979||28 Jun 2004||17 Apr 2007||Sun Microsystems, Inc.||Method and apparatus for at-speed diagnostics of embedded memories|
|US7243163||29 Mar 2002||10 Jul 2007||Good Technology, Inc.||System and method for full wireless synchronization of a data processing apparatus with a messaging system|
|US7260759||16 Jun 2004||21 Aug 2007||Sun Microsystems, Inc.||Method and apparatus for an efficient memory built-in self test architecture for high performance microprocessors|
|US7269768 *||18 Mar 2004||11 Sep 2007||Intel Corporation||Method and system to provide debugging of a computer system from firmware|
|US7287097||21 Jan 2003||23 Oct 2007||Good Technology, Inc.||System and method for full wireless synchronization of a data processing apparatus with a messaging system|
|US7293199||22 Jun 2004||6 Nov 2007||Sun Microsystems, Inc.||Method and apparatus for testing memories with different read/write protocols using the same programmable memory bist controller|
|US7342897 *||7 Aug 1999||11 Mar 2008||Cisco Technology, Inc.||Network verification tool|
|US7343179||13 Aug 2003||11 Mar 2008||Danger Research||System and method for previewing and purchasing ring tones for a mobile device|
|US7346476||17 Mar 2005||18 Mar 2008||International Business Machines Corporation||Event tracing with time stamp compression|
|US7359911||22 Mar 2002||15 Apr 2008||S2 Technologies, Inc.||System and method for building a database defining a plurality of communication interfaces|
|US7369954||17 Mar 2005||6 May 2008||International Business Machines Corporation||Event tracing with time stamp compression and history buffer based compression|
|US7373144||30 Sep 2002||13 May 2008||Danger, Inc.||System and method for automatically providing user status in a messaging service|
|US7383303||30 Sep 2002||3 Jun 2008||Danger, Inc.||System and method for integrating personal information management and messaging applications|
|US7392526||7 Aug 2006||24 Jun 2008||S2 Technologies, Inc.||System and method for formatting data for transmission between an embedded computer and a host computer having different machine characteristics|
|US7447799||24 Apr 2002||4 Nov 2008||Good Technology, Inc.||System and method for automatically updating a wireless device|
|US7464044 *||8 Dec 1998||9 Dec 2008||International Business Machines Corporation||Method and system for using emulation objects for developing point of sale|
|US7478141 *||26 Jun 2003||13 Jan 2009||Intel Corporation||Accessing firmware of a remote computer system using a remote firmware interface|
|US7493224||26 Nov 2007||17 Feb 2009||International Business Machines Corporation||Event tracing with time stamp compression and history buffer based compression|
|US7496902||17 Mar 2005||24 Feb 2009||International Business Machines Corporation||Data and instruction address compression|
|US7530076||18 Feb 2005||5 May 2009||S2 Technologies, Inc.||Dynamic interception of calls by a target device|
|US7596565||27 Mar 2003||29 Sep 2009||Good Technology||System and method for maintaining wireless file folders at a wireless device|
|US7613955 *||6 Jan 2006||3 Nov 2009||Microsoft Corporation||Collecting debug data from a wireless device|
|US7664067||15 Dec 2005||16 Feb 2010||Microsoft Corporation||Preserving socket connections over a wireless network|
|US7710912||11 Jul 2005||4 May 2010||Microsoft Corporation||Managing content synchronization between a data service and a data processing device|
|US7725298||13 Dec 2007||25 May 2010||International Business Machines Corporation||Event tracing with time stamp compression|
|US7743119||31 Mar 2003||22 Jun 2010||Motorola, Inc.||System and method for mapping identification codes|
|US7844906||14 Aug 2006||30 Nov 2010||Microsoft Corporation||Multi-mode communication apparatus and interface for contacting a user|
|US7962622||27 Mar 2003||14 Jun 2011||Motorola Mobility, Inc.||System and method for providing provisioning and upgrade services for a wireless device|
|US8074201 *||30 Oct 2002||6 Dec 2011||National Instruments Corporation||Deployment and execution of a program on an embedded device|
|US8135609||8 Jan 2002||13 Mar 2012||Microsoft Corporation||Identifying and surveying subscribers|
|US8156475||23 Jan 2008||10 Apr 2012||Samsung Electronics Co., Ltd.||Device and method for testing embedded software using emulator|
|US8239848||29 Sep 2008||7 Aug 2012||National Instruments Corporation||Incremental deployment and execution of a program on an embedded device|
|US8321511||21 Jan 2003||27 Nov 2012||Motorola Mobility Llc||System and method for full wireless synchronization of a data processing apparatus with a messaging system|
|US8516034||8 Jul 2002||20 Aug 2013||Good Technology Software, Inc||System and method for modifying application behavior based on network bandwidth|
|US8954512||16 Jul 2007||10 Feb 2015||Google Technology Holdings LLC||System and method for full wireless synchronization of a data processing apparatus with a data service|
|US9134759||12 Mar 2010||15 Sep 2015||Blackberry Limited||Dual-mode mobile communication device|
|US9367141||8 Mar 2013||14 Jun 2016||Blackberry Limited||Hand-held electronic device with a keyboard optimized for use with the thumbs|
|US20010027387 *||21 Mar 2001||4 Oct 2001||Hideaki Miyake||Debugging supporting apparatus, debugging supporting method and recording medium readable by computer with its programs recorded thereon|
|US20010034858 *||7 Feb 2001||25 Oct 2001||Mark Phillips||Debugging embedded systems|
|US20020059560 *||7 Feb 2001||16 May 2002||Mark Phillips||Debugging device and method|
|US20020198887 *||22 Mar 2002||26 Dec 2002||Mark Underseth||System and method for building a database defining a plurality of communication interfaces|
|US20030006919 *||9 Jul 2001||9 Jan 2003||Roger Collins||System and method for compressing data on a bandwidth-limited network|
|US20030009595 *||9 Jul 2001||9 Jan 2003||Roger Collins||System and method for compressing data using field-based code word generation|
|US20030037314 *||23 Oct 2001||20 Feb 2003||International Business Machines Corporation||Method and apparatus for testing and evaluating a software component using an abstraction matrix|
|US20030061292 *||22 Mar 2002||27 Mar 2003||Mark Underseth||System and method for providing an interface for com-compliant applications to communicate with embedded systems|
|US20030115570 *||13 Dec 2001||19 Jun 2003||International Business Machines Corporation||Development environment for building software applications that mimics the target environment|
|US20030204624 *||24 Apr 2002||30 Oct 2003||Gary Kushner||System and method for automatically updating a wireless device|
|US20040006630 *||27 Mar 2003||8 Jan 2004||John Friend||System and method for providing provisioning and upgrade services for a wireless device|
|US20040010734 *||30 Oct 2002||15 Jan 2004||Marius Ghercioiu||Deployment and execution of a program on an embedded device|
|US20040010773 *||2 Oct 2002||15 Jan 2004||Akom Technology Corporation.||Method and apparatus for displaying debug codes of a baisc input/output system|
|US20040030744 *||28 Feb 2003||12 Feb 2004||Rubin Andrew E.||Network portal apparatus and method|
|US20040054739 *||27 Mar 2003||18 Mar 2004||John Friend||System and method for maintaining wireless file folders at a wireless device|
|US20040078601 *||4 Aug 2003||22 Apr 2004||Chris Tengwall||System and method for operating a wireless device network|
|US20040267887 *||30 Jun 2003||30 Dec 2004||Berger Kelly D.||System and method for dynamically managing presence and contact information|
|US20040267926 *||26 Jun 2003||30 Dec 2004||Rothman Michael A.||Accessing firmware of a remote computer system using a remote firmware interface|
|US20040267944 *||30 Sep 2002||30 Dec 2004||Britt Joe Freeman||System and method for disabling and providing a notification for a data processing device|
|US20040268265 *||30 Jun 2003||30 Dec 2004||Berger Kelly D.||Multi-mode communication apparatus and interface for contacting a user|
|US20050229160 *||18 Mar 2004||13 Oct 2005||Rothman Michael A||Method and system to provide debugging of a computer system from firmware|
|US20060143294 *||27 Sep 2002||29 Jun 2006||Jeffrey Bush||System and method for efficiently managing data transports|
|US20060143523 *||23 Dec 2005||29 Jun 2006||Vimicro Corporation||Apparatus and method for debugging embedded software|
|US20060161582 *||18 Jan 2005||20 Jul 2006||Microsoft Corporation||Application object as primitive of operating system|
|US20060179427 *||28 Mar 2006||10 Aug 2006||Mark Underseth||System and method for automatically generating code templates for communication via a predefined communication interface|
|US20060212242 *||17 Mar 2005||21 Sep 2006||Levine Frank E||Event tracing with time stamp compression and history buffer based compression|
|US20060212243 *||17 Mar 2005||21 Sep 2006||Levine Frank E||Event tracing using hash tables with support for dynamic address to name resolution|
|US20060212244 *||17 Mar 2005||21 Sep 2006||Levine Frank E||Event tracing with time stamp compression|
|US20060212761 *||17 Mar 2005||21 Sep 2006||Levine Frank E||Data and instruction address compression|
|US20060212880 *||22 May 2006||21 Sep 2006||Mark Underseth||System and method for providing an interface for scripting programs to communicate with embedded systems|
|US20060282507 *||7 Aug 2006||14 Dec 2006||Mark Underseth||System and method for formatting data for transmission between an embedded computer and a host computer having different machine characteristics|
|US20070011507 *||3 Jun 2005||11 Jan 2007||Intel Corporation||System and method for remote system support|
|US20070061227 *||13 Sep 2005||15 Mar 2007||International Business Machines Corporation||Determining a computer system inventory|
|US20070239898 *||24 May 2007||11 Oct 2007||John Friend||System and method for full wireless synchronization of a data processing apparatus with a messaging service|
|US20070266107 *||16 Jul 2007||15 Nov 2007||John Friend||System and method for full wireless synchronization of a data processing apparatus with a data service|
|US20070283047 *||1 Oct 2002||6 Dec 2007||Theis Ronald L A||System and method for processing alphanumeric characters for display on a data processing device|
|US20080016498 *||26 Jun 2007||17 Jan 2008||S2 Technologies, Inc.||System and method for generating data sets for testing embedded systems|
|US20080091369 *||26 Nov 2007||17 Apr 2008||Levine Frank E||Event tracing with time stamp compression and history buffer based compression|
|US20080154547 *||13 Dec 2007||26 Jun 2008||Frank Eliot Levine||Event tracing with time stamp compression|
|US20080154574 *||21 Dec 2006||26 Jun 2008||Buechler Jodi A||Application emulation on a non-production computer system|
|US20080270840 *||23 Jan 2008||30 Oct 2008||Samsung Electronics Co., Ltd.||Device and method for testing embedded software using emulator|
|US20090103515 *||15 Dec 2005||23 Apr 2009||Danger, Inc.||System and method for preserving socket connections over a wireless network|
|US20090125591 *||30 Sep 2002||14 May 2009||Ficus Kirkpatrick||Instant messaging proxy apparatus and method|
|US20090138325 *||8 Jan 2002||28 May 2009||Britt Jr Joe Freeman||Apparatus and method for identifying and surveying subscribers|
|US20090138763 *||6 Jan 2006||28 May 2009||Baron Arnold||System and method for collecting debug data from a wireless device|
|US20090143059 *||2 May 2006||4 Jun 2009||Danger, Inc.||System and method remote servicing of a wireless data processing device|
|US20090144167 *||15 Feb 2005||4 Jun 2009||Pablo Calamera||System and method for managing data and voice connectivity for wireless devices|
|US20090217292 *||5 May 2009||27 Aug 2009||S2 Technologies, Inc.||System and method for testing devices|
|US20100254410 *||18 Jun 2010||7 Oct 2010||Good Technology, Inc.||System and method for compressing data using field-based code word generation|
|US20100306743 *||28 May 2010||2 Dec 2010||S2 Technologies, Inc||System and method for verifying code sequence execution|
|US20110191753 *||29 Sep 2008||4 Aug 2011||National Instruments Corporation||Incremental deployment and execution of a program on an embedded device|
|EP1148420A1 *||1 Feb 2001||24 Oct 2001||SGS-Thomson Microelectronics Limited||Debugging device and method|
|EP1148422A1 *||1 Feb 2001||24 Oct 2001||SGS-Thomson Microelectronics Limited||Computer system with debugging routine|
|EP1164488A1 *||14 Jun 2000||19 Dec 2001||Canal+ Technologies Société Anonyme||Remote debugging in an embedded system enviroment|
|EP1197865A1 *||13 Oct 2000||17 Apr 2002||CMG Eindhoven B.V.||A system and a method for automated testing of software|
|WO2001097039A1 *||14 Jun 2001||20 Dec 2001||Canal+ Technologies Societe Anonyme||Remote debugging in an embedded system environment|
|WO2006091408A2 *||13 Feb 2006||31 Aug 2006||S2 Technologies, Inc.||System and method for testing devices|
|WO2006091408A3 *||13 Feb 2006||26 Apr 2007||S2 Technologies Inc||System and method for testing devices|
|U.S. Classification||714/38.12, 717/178, 717/124, 714/42, 714/E11.213, 714/E11.21|
|9 Jul 2001||FPAY||Fee payment|
Year of fee payment: 4
|27 Jul 2005||FPAY||Fee payment|
Year of fee payment: 8
|1 Jul 2009||FPAY||Fee payment|
Year of fee payment: 12
|24 Oct 2014||AS||Assignment|
Owner name: BLACKBERRY LIMITED, ONTARIO
Free format text: CHANGE OF NAME;ASSIGNOR:RESEARCH IN MOTION LIMITED;REEL/FRAME:034045/0741
Effective date: 20130709